Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

Choosing a vendor for Cloud IAM is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options-and share the findings with the rest of your team.

Topics to be discussed include:
- The need for new RAS characteristics in next-gen applications
- The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems

Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.

Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.

Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.

IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months.
- Desktops, laptops and servers are the most compromised endpoints
- Login and access credentials are the most commonly exfiltrated information
- 55% of respondents spend 3 or more hours per compromised endpoint
- Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated
These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."

Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.

Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.

Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.

In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.

The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished

Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015

"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the
scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "

The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.

On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.

Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.

Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.